serpent, transform: rework GET_32BIT_MSB_FIRST, PUT_...
[secnet] / serpent.c
1 /*
2 * This file is
3 * Copyright (C) 1998 Ross Anderson, Eli Biham, Lars Knudsen
4 *
5 * For more information see http://www.cl.cam.ac.uk/users/rja14/serpent.html
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2, or (at your option)
10 * any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software Foundation,
19 * Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
20 *
21 */
22
23 #include <stdint.h>
24
25 #include "serpent.h"
26 #include "serpentsboxes.h"
27
28 #define GETPUT_CP(bytenum) \
29 (((basep) + (lenbytes) - (offset) - 4)[(bytenum)])
30
31 static uint32_t serpent_get_32bit(const uint8_t *basep,
32 int lenbytes, int offset)
33 {
34 return (((uint32_t)GETPUT_CP(0) << 24) |
35 ((uint32_t)GETPUT_CP(1) << 16) |
36 ((uint32_t)GETPUT_CP(2) << +8) |
37 ((uint32_t)GETPUT_CP(3)));
38 }
39
40 static void serpent_put_32bit(uint8_t *basep, int lenbytes, int offset, uint32_t value)
41 {
42 GETPUT_CP(0) = (char)((value) >> 24);
43 GETPUT_CP(1) = (char)((value) >> 16);
44 GETPUT_CP(2) = (char)((value) >> 8);
45 GETPUT_CP(3) = (char)(value);
46 }
47
48 void serpent_makekey(struct keyInstance *key, int keyLen,
49 const uint8_t *keyMaterial)
50 {
51 int i;
52 uint32_t j;
53 uint32_t w[132],k[132];
54
55 for(i=0; i<keyLen/32; i++)
56 w[i]=serpent_get_32bit(keyMaterial, keyLen/8, i*4);
57 if(keyLen<256)
58 w[i]=(serpent_get_32bit(keyMaterial, keyLen/8, i*4)
59 & ((1L<<((keyLen&31)))-1)) | (1L<<((keyLen&31)));
60 for(i++; i<8; i++)
61 w[i]=0;
62 for(i=8; i<16; i++)
63 w[i]=ROL(w[i-8]^w[i-5]^w[i-3]^w[i-1]^PHI^(i-8),11);
64 for(i=0; i<8; i++)
65 w[i]=w[i+8];
66 for(i=8; i<132; i++)
67 w[i]=ROL(w[i-8]^w[i-5]^w[i-3]^w[i-1]^PHI^i,11);
68
69 RND03(w[ 0], w[ 1], w[ 2], w[ 3], k[ 0], k[ 1], k[ 2], k[ 3]);
70 RND02(w[ 4], w[ 5], w[ 6], w[ 7], k[ 4], k[ 5], k[ 6], k[ 7]);
71 RND01(w[ 8], w[ 9], w[ 10], w[ 11], k[ 8], k[ 9], k[ 10], k[ 11]);
72 RND00(w[ 12], w[ 13], w[ 14], w[ 15], k[ 12], k[ 13], k[ 14], k[ 15]);
73 RND31(w[ 16], w[ 17], w[ 18], w[ 19], k[ 16], k[ 17], k[ 18], k[ 19]);
74 RND30(w[ 20], w[ 21], w[ 22], w[ 23], k[ 20], k[ 21], k[ 22], k[ 23]);
75 RND29(w[ 24], w[ 25], w[ 26], w[ 27], k[ 24], k[ 25], k[ 26], k[ 27]);
76 RND28(w[ 28], w[ 29], w[ 30], w[ 31], k[ 28], k[ 29], k[ 30], k[ 31]);
77 RND27(w[ 32], w[ 33], w[ 34], w[ 35], k[ 32], k[ 33], k[ 34], k[ 35]);
78 RND26(w[ 36], w[ 37], w[ 38], w[ 39], k[ 36], k[ 37], k[ 38], k[ 39]);
79 RND25(w[ 40], w[ 41], w[ 42], w[ 43], k[ 40], k[ 41], k[ 42], k[ 43]);
80 RND24(w[ 44], w[ 45], w[ 46], w[ 47], k[ 44], k[ 45], k[ 46], k[ 47]);
81 RND23(w[ 48], w[ 49], w[ 50], w[ 51], k[ 48], k[ 49], k[ 50], k[ 51]);
82 RND22(w[ 52], w[ 53], w[ 54], w[ 55], k[ 52], k[ 53], k[ 54], k[ 55]);
83 RND21(w[ 56], w[ 57], w[ 58], w[ 59], k[ 56], k[ 57], k[ 58], k[ 59]);
84 RND20(w[ 60], w[ 61], w[ 62], w[ 63], k[ 60], k[ 61], k[ 62], k[ 63]);
85 RND19(w[ 64], w[ 65], w[ 66], w[ 67], k[ 64], k[ 65], k[ 66], k[ 67]);
86 RND18(w[ 68], w[ 69], w[ 70], w[ 71], k[ 68], k[ 69], k[ 70], k[ 71]);
87 RND17(w[ 72], w[ 73], w[ 74], w[ 75], k[ 72], k[ 73], k[ 74], k[ 75]);
88 RND16(w[ 76], w[ 77], w[ 78], w[ 79], k[ 76], k[ 77], k[ 78], k[ 79]);
89 RND15(w[ 80], w[ 81], w[ 82], w[ 83], k[ 80], k[ 81], k[ 82], k[ 83]);
90 RND14(w[ 84], w[ 85], w[ 86], w[ 87], k[ 84], k[ 85], k[ 86], k[ 87]);
91 RND13(w[ 88], w[ 89], w[ 90], w[ 91], k[ 88], k[ 89], k[ 90], k[ 91]);
92 RND12(w[ 92], w[ 93], w[ 94], w[ 95], k[ 92], k[ 93], k[ 94], k[ 95]);
93 RND11(w[ 96], w[ 97], w[ 98], w[ 99], k[ 96], k[ 97], k[ 98], k[ 99]);
94 RND10(w[100], w[101], w[102], w[103], k[100], k[101], k[102], k[103]);
95 RND09(w[104], w[105], w[106], w[107], k[104], k[105], k[106], k[107]);
96 RND08(w[108], w[109], w[110], w[111], k[108], k[109], k[110], k[111]);
97 RND07(w[112], w[113], w[114], w[115], k[112], k[113], k[114], k[115]);
98 RND06(w[116], w[117], w[118], w[119], k[116], k[117], k[118], k[119]);
99 RND05(w[120], w[121], w[122], w[123], k[120], k[121], k[122], k[123]);
100 RND04(w[124], w[125], w[126], w[127], k[124], k[125], k[126], k[127]);
101 RND03(w[128], w[129], w[130], w[131], k[128], k[129], k[130], k[131]);
102
103 for(i=0; i<=32; i++)
104 for(j=0; j<4; j++)
105 key->subkeys[i][j] = k[4*i+j];
106 }
107
108 void serpent_encrypt(struct keyInstance *key,
109 const uint8_t plaintext[16],
110 uint8_t ciphertext[16])
111 {
112 register uint32_t x0, x1, x2, x3;
113 register uint32_t y0, y1, y2, y3;
114
115 x0=serpent_get_32bit(plaintext,16,+0);
116 x1=serpent_get_32bit(plaintext,16,+4);
117 x2=serpent_get_32bit(plaintext,16,+8);
118 x3=serpent_get_32bit(plaintext,16,12);
119
120 /* Start to encrypt the plaintext x */
121 keying(x0, x1, x2, x3, key->subkeys[ 0]);
122 RND00(x0, x1, x2, x3, y0, y1, y2, y3);
123 transform(y0, y1, y2, y3, x0, x1, x2, x3);
124 keying(x0, x1, x2, x3, key->subkeys[ 1]);
125 RND01(x0, x1, x2, x3, y0, y1, y2, y3);
126 transform(y0, y1, y2, y3, x0, x1, x2, x3);
127 keying(x0, x1, x2, x3, key->subkeys[ 2]);
128 RND02(x0, x1, x2, x3, y0, y1, y2, y3);
129 transform(y0, y1, y2, y3, x0, x1, x2, x3);
130 keying(x0, x1, x2, x3, key->subkeys[ 3]);
131 RND03(x0, x1, x2, x3, y0, y1, y2, y3);
132 transform(y0, y1, y2, y3, x0, x1, x2, x3);
133 keying(x0, x1, x2, x3, key->subkeys[ 4]);
134 RND04(x0, x1, x2, x3, y0, y1, y2, y3);
135 transform(y0, y1, y2, y3, x0, x1, x2, x3);
136 keying(x0, x1, x2, x3, key->subkeys[ 5]);
137 RND05(x0, x1, x2, x3, y0, y1, y2, y3);
138 transform(y0, y1, y2, y3, x0, x1, x2, x3);
139 keying(x0, x1, x2, x3, key->subkeys[ 6]);
140 RND06(x0, x1, x2, x3, y0, y1, y2, y3);
141 transform(y0, y1, y2, y3, x0, x1, x2, x3);
142 keying(x0, x1, x2, x3, key->subkeys[ 7]);
143 RND07(x0, x1, x2, x3, y0, y1, y2, y3);
144 transform(y0, y1, y2, y3, x0, x1, x2, x3);
145 keying(x0, x1, x2, x3, key->subkeys[ 8]);
146 RND08(x0, x1, x2, x3, y0, y1, y2, y3);
147 transform(y0, y1, y2, y3, x0, x1, x2, x3);
148 keying(x0, x1, x2, x3, key->subkeys[ 9]);
149 RND09(x0, x1, x2, x3, y0, y1, y2, y3);
150 transform(y0, y1, y2, y3, x0, x1, x2, x3);
151 keying(x0, x1, x2, x3, key->subkeys[10]);
152 RND10(x0, x1, x2, x3, y0, y1, y2, y3);
153 transform(y0, y1, y2, y3, x0, x1, x2, x3);
154 keying(x0, x1, x2, x3, key->subkeys[11]);
155 RND11(x0, x1, x2, x3, y0, y1, y2, y3);
156 transform(y0, y1, y2, y3, x0, x1, x2, x3);
157 keying(x0, x1, x2, x3, key->subkeys[12]);
158 RND12(x0, x1, x2, x3, y0, y1, y2, y3);
159 transform(y0, y1, y2, y3, x0, x1, x2, x3);
160 keying(x0, x1, x2, x3, key->subkeys[13]);
161 RND13(x0, x1, x2, x3, y0, y1, y2, y3);
162 transform(y0, y1, y2, y3, x0, x1, x2, x3);
163 keying(x0, x1, x2, x3, key->subkeys[14]);
164 RND14(x0, x1, x2, x3, y0, y1, y2, y3);
165 transform(y0, y1, y2, y3, x0, x1, x2, x3);
166 keying(x0, x1, x2, x3, key->subkeys[15]);
167 RND15(x0, x1, x2, x3, y0, y1, y2, y3);
168 transform(y0, y1, y2, y3, x0, x1, x2, x3);
169 keying(x0, x1, x2, x3, key->subkeys[16]);
170 RND16(x0, x1, x2, x3, y0, y1, y2, y3);
171 transform(y0, y1, y2, y3, x0, x1, x2, x3);
172 keying(x0, x1, x2, x3, key->subkeys[17]);
173 RND17(x0, x1, x2, x3, y0, y1, y2, y3);
174 transform(y0, y1, y2, y3, x0, x1, x2, x3);
175 keying(x0, x1, x2, x3, key->subkeys[18]);
176 RND18(x0, x1, x2, x3, y0, y1, y2, y3);
177 transform(y0, y1, y2, y3, x0, x1, x2, x3);
178 keying(x0, x1, x2, x3, key->subkeys[19]);
179 RND19(x0, x1, x2, x3, y0, y1, y2, y3);
180 transform(y0, y1, y2, y3, x0, x1, x2, x3);
181 keying(x0, x1, x2, x3, key->subkeys[20]);
182 RND20(x0, x1, x2, x3, y0, y1, y2, y3);
183 transform(y0, y1, y2, y3, x0, x1, x2, x3);
184 keying(x0, x1, x2, x3, key->subkeys[21]);
185 RND21(x0, x1, x2, x3, y0, y1, y2, y3);
186 transform(y0, y1, y2, y3, x0, x1, x2, x3);
187 keying(x0, x1, x2, x3, key->subkeys[22]);
188 RND22(x0, x1, x2, x3, y0, y1, y2, y3);
189 transform(y0, y1, y2, y3, x0, x1, x2, x3);
190 keying(x0, x1, x2, x3, key->subkeys[23]);
191 RND23(x0, x1, x2, x3, y0, y1, y2, y3);
192 transform(y0, y1, y2, y3, x0, x1, x2, x3);
193 keying(x0, x1, x2, x3, key->subkeys[24]);
194 RND24(x0, x1, x2, x3, y0, y1, y2, y3);
195 transform(y0, y1, y2, y3, x0, x1, x2, x3);
196 keying(x0, x1, x2, x3, key->subkeys[25]);
197 RND25(x0, x1, x2, x3, y0, y1, y2, y3);
198 transform(y0, y1, y2, y3, x0, x1, x2, x3);
199 keying(x0, x1, x2, x3, key->subkeys[26]);
200 RND26(x0, x1, x2, x3, y0, y1, y2, y3);
201 transform(y0, y1, y2, y3, x0, x1, x2, x3);
202 keying(x0, x1, x2, x3, key->subkeys[27]);
203 RND27(x0, x1, x2, x3, y0, y1, y2, y3);
204 transform(y0, y1, y2, y3, x0, x1, x2, x3);
205 keying(x0, x1, x2, x3, key->subkeys[28]);
206 RND28(x0, x1, x2, x3, y0, y1, y2, y3);
207 transform(y0, y1, y2, y3, x0, x1, x2, x3);
208 keying(x0, x1, x2, x3, key->subkeys[29]);
209 RND29(x0, x1, x2, x3, y0, y1, y2, y3);
210 transform(y0, y1, y2, y3, x0, x1, x2, x3);
211 keying(x0, x1, x2, x3, key->subkeys[30]);
212 RND30(x0, x1, x2, x3, y0, y1, y2, y3);
213 transform(y0, y1, y2, y3, x0, x1, x2, x3);
214 keying(x0, x1, x2, x3, key->subkeys[31]);
215 RND31(x0, x1, x2, x3, y0, y1, y2, y3);
216 x0 = y0; x1 = y1; x2 = y2; x3 = y3;
217 keying(x0, x1, x2, x3, key->subkeys[32]);
218 /* The ciphertext is now in x */
219
220 serpent_put_32bit(ciphertext,16,+0, x0);
221 serpent_put_32bit(ciphertext,16,+4, x1);
222 serpent_put_32bit(ciphertext,16,+8, x2);
223 serpent_put_32bit(ciphertext,16,12, x3);
224 }
225
226 void serpent_decrypt(struct keyInstance *key,
227 const uint8_t ciphertext[16],
228 uint8_t plaintext[16])
229 {
230 register uint32_t x0, x1, x2, x3;
231 register uint32_t y0, y1, y2, y3;
232
233 x0=serpent_get_32bit(ciphertext,16,+0);
234 x1=serpent_get_32bit(ciphertext,16,+4);
235 x2=serpent_get_32bit(ciphertext,16,+8);
236 x3=serpent_get_32bit(ciphertext,16,12);
237
238 /* Start to decrypt the ciphertext x */
239 keying(x0, x1, x2, x3, key->subkeys[32]);
240 InvRND31(x0, x1, x2, x3, y0, y1, y2, y3);
241 keying(y0, y1, y2, y3, key->subkeys[31]);
242 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
243 InvRND30(x0, x1, x2, x3, y0, y1, y2, y3);
244 keying(y0, y1, y2, y3, key->subkeys[30]);
245 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
246 InvRND29(x0, x1, x2, x3, y0, y1, y2, y3);
247 keying(y0, y1, y2, y3, key->subkeys[29]);
248 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
249 InvRND28(x0, x1, x2, x3, y0, y1, y2, y3);
250 keying(y0, y1, y2, y3, key->subkeys[28]);
251 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
252 InvRND27(x0, x1, x2, x3, y0, y1, y2, y3);
253 keying(y0, y1, y2, y3, key->subkeys[27]);
254 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
255 InvRND26(x0, x1, x2, x3, y0, y1, y2, y3);
256 keying(y0, y1, y2, y3, key->subkeys[26]);
257 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
258 InvRND25(x0, x1, x2, x3, y0, y1, y2, y3);
259 keying(y0, y1, y2, y3, key->subkeys[25]);
260 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
261 InvRND24(x0, x1, x2, x3, y0, y1, y2, y3);
262 keying(y0, y1, y2, y3, key->subkeys[24]);
263 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
264 InvRND23(x0, x1, x2, x3, y0, y1, y2, y3);
265 keying(y0, y1, y2, y3, key->subkeys[23]);
266 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
267 InvRND22(x0, x1, x2, x3, y0, y1, y2, y3);
268 keying(y0, y1, y2, y3, key->subkeys[22]);
269 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
270 InvRND21(x0, x1, x2, x3, y0, y1, y2, y3);
271 keying(y0, y1, y2, y3, key->subkeys[21]);
272 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
273 InvRND20(x0, x1, x2, x3, y0, y1, y2, y3);
274 keying(y0, y1, y2, y3, key->subkeys[20]);
275 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
276 InvRND19(x0, x1, x2, x3, y0, y1, y2, y3);
277 keying(y0, y1, y2, y3, key->subkeys[19]);
278 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
279 InvRND18(x0, x1, x2, x3, y0, y1, y2, y3);
280 keying(y0, y1, y2, y3, key->subkeys[18]);
281 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
282 InvRND17(x0, x1, x2, x3, y0, y1, y2, y3);
283 keying(y0, y1, y2, y3, key->subkeys[17]);
284 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
285 InvRND16(x0, x1, x2, x3, y0, y1, y2, y3);
286 keying(y0, y1, y2, y3, key->subkeys[16]);
287 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
288 InvRND15(x0, x1, x2, x3, y0, y1, y2, y3);
289 keying(y0, y1, y2, y3, key->subkeys[15]);
290 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
291 InvRND14(x0, x1, x2, x3, y0, y1, y2, y3);
292 keying(y0, y1, y2, y3, key->subkeys[14]);
293 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
294 InvRND13(x0, x1, x2, x3, y0, y1, y2, y3);
295 keying(y0, y1, y2, y3, key->subkeys[13]);
296 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
297 InvRND12(x0, x1, x2, x3, y0, y1, y2, y3);
298 keying(y0, y1, y2, y3, key->subkeys[12]);
299 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
300 InvRND11(x0, x1, x2, x3, y0, y1, y2, y3);
301 keying(y0, y1, y2, y3, key->subkeys[11]);
302 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
303 InvRND10(x0, x1, x2, x3, y0, y1, y2, y3);
304 keying(y0, y1, y2, y3, key->subkeys[10]);
305 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
306 InvRND09(x0, x1, x2, x3, y0, y1, y2, y3);
307 keying(y0, y1, y2, y3, key->subkeys[ 9]);
308 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
309 InvRND08(x0, x1, x2, x3, y0, y1, y2, y3);
310 keying(y0, y1, y2, y3, key->subkeys[ 8]);
311 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
312 InvRND07(x0, x1, x2, x3, y0, y1, y2, y3);
313 keying(y0, y1, y2, y3, key->subkeys[ 7]);
314 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
315 InvRND06(x0, x1, x2, x3, y0, y1, y2, y3);
316 keying(y0, y1, y2, y3, key->subkeys[ 6]);
317 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
318 InvRND05(x0, x1, x2, x3, y0, y1, y2, y3);
319 keying(y0, y1, y2, y3, key->subkeys[ 5]);
320 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
321 InvRND04(x0, x1, x2, x3, y0, y1, y2, y3);
322 keying(y0, y1, y2, y3, key->subkeys[ 4]);
323 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
324 InvRND03(x0, x1, x2, x3, y0, y1, y2, y3);
325 keying(y0, y1, y2, y3, key->subkeys[ 3]);
326 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
327 InvRND02(x0, x1, x2, x3, y0, y1, y2, y3);
328 keying(y0, y1, y2, y3, key->subkeys[ 2]);
329 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
330 InvRND01(x0, x1, x2, x3, y0, y1, y2, y3);
331 keying(y0, y1, y2, y3, key->subkeys[ 1]);
332 inv_transform(y0, y1, y2, y3, x0, x1, x2, x3);
333 InvRND00(x0, x1, x2, x3, y0, y1, y2, y3);
334 x0 = y0; x1 = y1; x2 = y2; x3 = y3;
335 keying(x0, x1, x2, x3, key->subkeys[ 0]);
336 /* The plaintext is now in x */
337
338 serpent_put_32bit(plaintext,16,+0, x0);
339 serpent_put_32bit(plaintext,16,+4, x1);
340 serpent_put_32bit(plaintext,16,+8, x2);
341 serpent_put_32bit(plaintext,16,12, x3);
342 }